2018
DOI: 10.26483/ijarcs.v9i2.5644
|View full text |Cite
|
Sign up to set email alerts
|

Cocowa Model: Watchdog Mechanism Used to Propagate Selfish Nodes in Cellular Networks of Moving Vehicles

Abstract: The cellular networks are used to move the rapid growth in the mobile data in the explosion on the cellular network. The offload cellular networks are dynamic in the swimming condition. The highly dynamic sector is improved by the WIFI networks the Access point is configured by the MAC and the IP address. The mobile Ad hoc network model is formatted on the selfish node behavior .The detecting selfish node is performed by the watch dog timers. The swimming performances are used to move the delay tolerant networ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…Many security approaches [4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20] employ the watchdog approach to unmask malicious nodes. However, although the use of the watchdog approach allows to detect malicious nodes, it has several limitations [4] and All security approaches using this technique inherit these limitations.…”
Section: Background and Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Many security approaches [4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20] employ the watchdog approach to unmask malicious nodes. However, although the use of the watchdog approach allows to detect malicious nodes, it has several limitations [4] and All security approaches using this technique inherit these limitations.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Almost of existing reputation approaches [4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20] based on the watchdog approach cannot detect malicious nodes when they launch selective dropping attack, which is one of the important limitations of watchdog approach. These nodes drop data packet at low rate in order to:…”
Section: Problem Statementmentioning
confidence: 99%
See 2 more Smart Citations
“…Many security approaches [4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20] employ the watchdog approach to unmask malicious nodes. However, although the use of the watchdog approach allows to detect malicious nodes, it has several limitations [4] and All security approaches using this technique inherit these limitations.…”
Section: Background and Related Workmentioning
confidence: 99%